17. WAN Technologies
| Institution | Huawei - JKUAT |
| Course | Information Technolo... |
| Year | 3rd Year |
| Semester | Unknown |
| Posted By | Jeff Odhiambo |
| File Type | |
| Pages | 55 Pages |
| File Size | 1.44 MB |
| Views | 3983 |
| Downloads | 0 |
| Price: |
Buy Now
|
Description
As economic globalization and digital transformation accelerate, enterprises keep expanding their scales. More and more branches locate in different regions, with each branch network being considered as a local area network (LAN). The headquarters and branches need to cross geographical locations to communicate with each other. To better carry out services, an enterprise needs to connect these geographically dispersed branches through a wide area network (WAN).
The development of the WAN technologies is accompanied by the continuously increased bandwidth.In the early stage, X.25 provided only the bandwidth of 64 kbit/s. Later, the digital data network (DDN) and Frame Relay (FR) increased the bandwidth to 2 Mbit/s. Synchronous digital hierarchy (SDH) and asynchronous transfer mode (ATM) further increased the bandwidth to 10 Gbit/s. Now, the current IP-based WANs provide 10 Gbit/s or even higher bandwidth.
This course describes the development history of WAN technologies, especially the implementations and configurations of Point-to-Point Protocol (PPP) and Point-to-Point Protocol over Ethernet (PPPoE).
Below is the document preview.
PSY 211: GUIDANCE AND COUNSELLING
Trending!
Guidance means of helping individuals to understand and use wisely the educational, vocational and personal opportunities they have as a form of systematic assistance in achieving satisfactory adjustment to school and to life in general.
3553 Views
1 Downloads
608.55 KB
Ethics for IT Workers and IT Users
Trending!
Ethics in Information Technology, Fourth Edition
3088 Views
0 Downloads
710 KB
Computer Legal and Ethical Issues
Trending!
The focus is on technical approaches to the detection, prevention, and recovery from
computer and network attacks. One other tool is the deterrent factor of law enforcement. Many types of computer attacks can be considered crimes and, as such, carry criminal sanctions. This section begins with a classification of types of computer crime and then looks at some of the unique law-enforcement challenges of dealing with computer crime.
3218 Views
0 Downloads
113.27 KB
Law of Agency
Trending!
It is a general principle of contract law that only the parties to the contract acquire rights and liabilities under it. A well recognized exception to this general rule is the concept of agency.
12 Pages
3752 Views
1 Downloads
211.25 KB
PP1 TERM 3 SCHEMES OF WORK- ART
Trending!
UPDATED ARTS SCHEMES OF WORK TERM3 PP1
12 Pages
4285 Views
0 Downloads
837.93 KB
CRE SCHEMES OF WORK PP1 TERM3
Trending!
UPDATED CRE SCHEMES OF WORK PP1 TERM3
9 Pages
3951 Views
0 Downloads
868.76 KB
ENVIROMENTAL ACTIVITIES SCHEMES OF WORK PP1 TERM3
Trending!
UPDATED ENVIRONMENTAL ACTIVITIES SCHEMES OF WORK PP1 TERM3
18 Pages
3939 Views
0 Downloads
873.3 KB